Professional Documents
Culture Documents
M.Tech CSE Student, Computer Science and Engineering, NERIST, Arunachal Pradesh, India
Abstract
The increase in global Internet security threats means businesses now have to allocate a significant portion of their budget to
protecting their users, monetary. assets, data, and intellectual property. Unfortunately, implementing traditional client/server
endpoint security solutions often entails suffering unplanned downtime and performance issues. As a result, many Managed
Service Providers (MSPs) have added endpoint management to their portfolio of services. This in turn delivers powerful security
solutions that protect against even the most sophisticated online threats, without sacrificing system performance because they can
be deployed with ease and are simple to manage. Backed by a unique, real-time threat detection architecture they provide
scalable security that addresses historical challenges MSPs have faced quickly and efficiently, while helping generate new
revenue streams and maintain margins full stop.
Keywords: Managed Service Providers (MSPs), BYOD (Bring Your Own Device), Total Cost Of Ownership (TCO).
--------------------------------------------------------------------***---------------------------------------------------------------------1. INTRODUCTION
Cloud computing has fundamentally changed the way
businesses and consumers use computers and technology
and the way Information Technology (IT) professionals
manage those resources. While the cloud has delivered a
multitude of benefits to technical and non-technical people
alike, there have also been significant downsides to reliance
on cloud technology, including unplanned outages and even
outright cyber-attacks and data theft. Though the cloud has
become ubiquitous, there still remains considerable
confusion as to how cloud computing can be used by
managed service providers (MSPs) to enhance the security,
privacy, and productivity of their customers. Below are
several common scenarios in which cloud computing is
helping MSPs to more efficiently and cost-effectively ensure
greater endpoint (PC, laptop, smart phone, tablet, etc.)
security for clients all over the world.
2.
ADVANCES
IN
MSP
SECURITY
_______________________________________________________________________________________
Volume: 03 Issue: 07 | Jul-2014, Available @ http://www.ijret.org
217
5. ENDPOINT MANAGEMENT
One of the most important models for protecting data and
security involves securing client endpoints (such as desktop
computers, laptops, smart phones and tablets), because such
devices are frequently targeted by cybercriminals. Cloudbased endpoint management and protection provides MSPs
with a highly efficient, cost-effective way to protect their
customers from a variety of cyber-attacks.
The advantages of using a cloud-based endpoint security
platform become readily apparent when users no longer have
to suffer through time-consuming signature (also known as
virus definition file) downloads and scans. These processes
can place enormous CPU loads on the protected device,
causing significant reductions in end-user productivityand
consequent increases in client frustration. The easier a
security solution is for clients to use, the higher its adoption
rate and user satisfaction will be.
_______________________________________________________________________________________
Volume: 03 Issue: 07 | Jul-2014, Available @ http://www.ijret.org
218
6. CYBER THREATS
The world of the Internet has become increasingly
dangerous; not only are there more threats than ever, but
they are also more difficult to identify and protect against,
especially with more users surfing the web. As such,
organizations (and the MSPs that serve them) need better
methods for protecting and safeguarding corporate data than
ever before.
MSPs who take advantage of modern cloud-based security
(such as Web root Secure Anywhere solutions) are far
better able to protect their clients from this constantlyevolving environment of Internet-based threats and
malware. Some of the most significant security benefits of
this cloud-based technology include:
1) Prevents spyware & viruses commonly spread through
Internet.
2) URL filtering to help end users ensure they reach correct
destination (prevents routing users to sites designed to steal
data or infect devices).
3) Prevents phishing & bad content that could compromise
networks and sensitive data.
4) Prevents URL circumvention (stops user attempts to
either access blocked pages or circumvent monitoring).
Cloud-based protection of cyber threats is an essential
feature for MSPs to offer their clients, as the likelihood of
data loss or malware infection continues to grow. Preventing
infections not only benefits clients by ensuring uninterrupted
operations and continued productivity, it also helps to
solidify a clients confidence in their MSP, an important
factor when an MSP seeks to maintain long-term, stable, and
profitable relationships with its customers.
Managed service providers and IT administrators can use or
an existing modern cloud-based security solution to create
custom access policies for departments, groups and
individuals, and to demonstrate compliance with acceptableuse policies. The built-in quota policy limits bandwidth
consumption, time spent online and number of sites
accessed.
8. CONCLUSIONS
It is an unfortunate fact that with each passing day the
Internet is becoming a more perilous place; threats are
multiplying in both their complexity and ferocity, and MSPs
must adapt in order to protect customers from these rapidlyescalating risks. By partnering with modern cloud-based
security, MSPs can take advantage of innovative, cloudbased technologies that make it easy to deploy and manage a
comprehensive suite of security solutions purpose-built to
protect organizations and users from a variety of threats.
Combining unrivalled power and unprecedented efficiency,
modern cloud-based security solutions give MSPs the
modern tools they need to ensure client security, build
customer loyalty and dramatically reduce security solution
management costs.
REFERENCES
[1]. Andreas Berl1, Erol Gelenbe, Marco di Girolamo,
Giovanni Giuliani, Hermann de Meer1, Minh Quan Dang
and
Kostas
Pentikousis,Energy-Efficient
Cloud
Computing, The Computer Journal, Vol. 53 No. 7, 2010.
[2]. Chipurupalli Sekhar, U. Nanaji, Secure Cloud By It
Auditing, International Journal Of Modern Engineering
Research (IJMER) www.ijmer.com vol.1, Issue.2, pp-332337 issn: 2249-6645.
[3]. Anthony Bisong & Sayed.M.Rahman, An Overview Of
The Security Concerns In Enterprise Cloud Computing,
IJNSA, Vol.3,No.1, Jan 2011.
[4]. Amazon EC2 and S3, online at http://aws.amazon.com/
[5].
Google
App
Engine
at
http://code.google.com/appengine/
_______________________________________________________________________________________
Volume: 03 Issue: 07 | Jul-2014, Available @ http://www.ijret.org
219
[6].
Website
references,
www.wikipedia.com,
www.saleforce.com, www.ibm.com,www.sun.com.
BIOGRAPHIES
Bhaskar Kamal Baishya received his
B.Tech Degree in Computer Science and
Engineering from, Assam Don Bosco
University, Assam. Now he is an M.Tech
final year student in the Department of
Computer Science and Engineering, North Eastern Regional
Institute of science and Technology, Nirjuli, Arunachal
Pradesh. His research interest includes Embedded Systems
and Cloud Computing.
_______________________________________________________________________________________
Volume: 03 Issue: 07 | Jul-2014, Available @ http://www.ijret.org
220